Network Security

It seems like collectively as an industry, we’ve determined medical and healthcare information as one of the most important segments of data to protect, and rightfully so. As medical IoT starts to become more and more standard, now we’re not only protecting people’s personal data, we’re now responsible for protecting their actual health and, in some cases, their lives. Is that something that network security managers are ready to take on?

IoT security is a headache, a mess and several other flavors of annoying for any enterprise, but in healthcare, it can be literally life and death. Compromising any connected device has two main consequences – one is to enlist devices into a botnet, like the security camera-capturing Mirai, and the other is to offer a passage deeper into any infrastructure the device is connected to. +ALSO ON NETWORK WORLD: What is IoT? + Bluetooth Mesh takes aim at enterprise IoT, but hasn’t taken flight But medical IoT poses additional security risks. For one thing, connected records systems and anything that contains personal information are attractive targets for identity thieves – your Social Security number is all over your medical records. Compromising a medical IoT device and pivoting to other targets on the network could result in a breach of these records, researchers have found . Under certain circumstances, an attacker could exercise direct control over medical equipment , with potentially fatal consequences – witness the infamous hacked insulin pump, which first made headlines all the way back in 2011. The key difference between traditional security and IoT security is visibility, according to Xu Zou, CEO and co-founder at IoT […]

We talk a lot about network security here and it’s articles like these that make it worth it. If even a weak hacker can reset your password and access your email, your computer or your network, imagine what someone with some experience and solid chops could do. Make sure that you’re protected with the right kind of network security systems to do your absolute best to avoid the fallout from these types of attacks. Don’t know what you should be looking for? Give us a call and we’ll help you find the best options for your organization.

Credit: Thinkstock At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” ( pdf ). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures. They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram. To pull off a password reset man-in-the-middle, an attacker only needs to setup a website that requires users to register for the site in order to access whatever bait the site is using; it might be free services, free software, or some other freebie that can only be downloaded by logging in. The registration process may ask for differing bits of basic information, but as soon as a victim enters his email address, the automated attack can begin. The attacker goes to the specified email provider or site and starts the “forgot my password” process. If a CAPTHCA challenge is presented, the attacker […]

With so many security risks out there today, we think it’s good to keep you up to date on the latest threats that we come across. If you’re a subscriber to Network World then you’ve probably heard about this but, if not, take a look, stay vigilant and make sure to keep your network security protocols up to date!

Credit: REUTERS/North Korea’s Korean Central News Agency (KCNA) Watch out for attacks by Hidden Cobra, aka North Korean government hackers, the DHS and the FBI warned in a joint technical alert. The US government didn’t tiptoe around the issue, instead pointing the finger of blame at North Korea for a series of cyberattacks dating back to 2009. Who the heck is Hidden Cobra? You probably already know about these cyber actors who are usually referred to as the Lazarus Group. Back in 2014 when the hackers targeted Sony Pictures Entertainment, the group was publicly referring to itself as Guardians of the Peace . In the alert published by US-CERT yesterday, Homeland Security and the FBI released technical details about the tools which “cyber actors of the North Korean government” have used “to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.” The Hidden Cobra group has been busy targeting victims for the last eight years. Malicious tools in their arsenal include DDoS botnets, keyloggers, RATs (remote access tools) and wiper malware. The group tends to target machines running old, unsupported versions of Microsoft Windows. It has also exploited Adobe Flash Player vulnerabilities and […]

Search

Contact Us

Categories

Custom Designs

We connect with your team to analyze your company’s unique situation to discern and construct the perfect network solution that meets your needs and performance goals.

Powerful Implementation

We work within your budget and schedule to get vital network solutions established in your business. Our efficient installation services, along with employee training, strive to keep your business running at peak performance.

Management and Monitoring

We use the most up-to-date monitoring software and tools to make sure your network remains secure. We provide protection against the many virtual threats that threaten your profitability.

our commitment

We work tirelessly to make sure that your network is running efficiently and effectively and, possibly even more importantly, cost effectively.